General

  • Target

    Umbral.exe

  • Size

    229KB

  • Sample

    250109-yns7bayrd1

  • MD5

    5ef325936584fbe65e97c89d5787b22b

  • SHA1

    fbe3db5453a683a05c140de6a48169c683ffdb68

  • SHA256

    b40b8ae2d3083f53ce18753b29592ba542865938295c4d656ecc649c6038d57b

  • SHA512

    62db38a9449a7e6bdb0fe26228df1a2a8c9f62a05a28aff043b0e40e0eb2ae91ffc7d765b9fcfd74e981e413ab732f54545fb40ffe7ff0904993ba61fa4c00ad

  • SSDEEP

    6144:lloZM+rIkd8g+EtXHkv/iD4AiblAmB5K9/Cwhl0B9b8e1mJi:noZtL+EP8AiblAmB5K9/Cwhl0z3

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1327001236427374632/7Pk6g0WQ6MwIEJIF_o_6hmjyc7skzfyqSA-CeUJAscxgUazxLOxY6BmLBp_NipL3KOiW

Targets

    • Target

      Umbral.exe

    • Size

      229KB

    • MD5

      5ef325936584fbe65e97c89d5787b22b

    • SHA1

      fbe3db5453a683a05c140de6a48169c683ffdb68

    • SHA256

      b40b8ae2d3083f53ce18753b29592ba542865938295c4d656ecc649c6038d57b

    • SHA512

      62db38a9449a7e6bdb0fe26228df1a2a8c9f62a05a28aff043b0e40e0eb2ae91ffc7d765b9fcfd74e981e413ab732f54545fb40ffe7ff0904993ba61fa4c00ad

    • SSDEEP

      6144:lloZM+rIkd8g+EtXHkv/iD4AiblAmB5K9/Cwhl0B9b8e1mJi:noZtL+EP8AiblAmB5K9/Cwhl0z3

    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks